EasyManuals Logo
Home>Zte>Switch>ZXR10 2920

Zte ZXR10 2920 User Manual

Zte ZXR10 2920
341 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #173 background imageLoading...
Page #173 background image
Confidential and Proprietary Information of ZTE CORPORATION 159
Chapter 8
Access Service
With the rapid expansion of Ethernet construction scale, to
meet fast increase of subscribers and requirement of diversified
broadband services, Network Access Service (NAS) is embedded
on the switch to improve authentication and management of
access subscribers and better support billing, security,
operation, and management of broadband network.
NAS uses the 802. 1x protocol and RADIUS protocol to realize
the authentication and management of access subscribers. It
is highly efficient, safe, and easy to operate.
IEEE 802. 1x is called port-based network access control
protocol. Its protocol system includes three key parts:
Client system is generally a user terminal system installed with
client software. A subscriber originates the IEEE802. 1x
protocol authentication process through this client software.
To support the port-based network access control, client system
must support Extensible Authentication Protocol Over LAN
(EAPOL).
Authentication system is generally network equipment that
supports IEEE802. 1x protocol, for example, switch.
Corresponding to ports of different subscribers (ports could be
physical ports or MAC address, VLAN, or IP address of user
equipment). Authentication system has two logical ports:
controlled port and uncontrolled port.
îš„ Uncontrolled port is always in the state that the bidirectional
connections are available. It is used to transfer EAPOL
frames and can ensure that client can always send or receive
authentication.
îš„ Control port is enabled only when authentication is passed.
It is used to transfer network resource and services.
Controlled port can be configured as bidirectional controlled
or input controlled to meet requirement of different
applications. If subscriber authentication is not passed,
this subscriber cannot visit services provided by
authentication system.
Introduction
Client System
Authentication
System

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Zte ZXR10 2920 and is the answer not in the manual?

Zte ZXR10 2920 Specifications

General IconGeneral
BrandZte
ModelZXR10 2920
CategorySwitch
LanguageEnglish

Related product manuals